{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:51:57Z","timestamp":1725515517564},"publisher-location":"Boston, MA","reference-count":14,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441946294"},{"type":"electronic","value":"9780387790268"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-0-387-79026-8_16","type":"book-chapter","created":{"date-parts":[[2008,6,14]],"date-time":"2008-06-14T06:54:33Z","timestamp":1213426473000},"page":"235-243","source":"Crossref","is-referenced-by-count":0,"title":["Automating Identity Management and Access Control"],"prefix":"10.1007","author":[{"given":"Rieks","family":"Joosten","sequence":"first","affiliation":[]},{"given":"Stef","family":"Joosten","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Kruit, M.: Role Based Access Control bij ABN AMRO \u2014 Een lange en heuvelachtige weg. In: Identity 2006, IIR (October 2006)"},{"key":"16_CR2","unstructured":"Wijnschenk, A., Willigenburg, S., van Andel, K.: Implementatie bij AEGON NL. In: Identity 2006, IIR (October 2006)"},{"key":"16_CR3","unstructured":"Kotteman, D.: Access control, role based? In: Identity 2006, IIR (October 2006)"},{"key":"16_CR4","unstructured":"Bus, R.A.: Role based access control implementation strategy. In: Identity 2006, IIR (October 2006)"},{"key":"16_CR5","unstructured":"van den Branden, E.: Identity 2006. In: Identity 2006, IIR (October 2006)"},{"key":"16_CR6","unstructured":"Gebel, G.: The importance of role management for compliance and user provisioning. In: Identity 2006, IIR (October 2006)"},{"key":"16_CR7","unstructured":"OMG: Semantics of business vocabulary and business rules specification (2006)"},{"key":"16_CR8","unstructured":"Joosten, S., Joosten, R.: Specifying business processes by means of rules. In: Proceedings European Business Rules Conference, Amsterdam (June 2005)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"United States Code: Sarbanes-Oxley Act of 2002, HR 3763, PL 107-204, 116 Stat 745. Codified in sections 11, 15, 18, 28, and 29 USC (2002)","DOI":"10.2307\/1342618"},{"key":"16_CR10","unstructured":"American National Standards Institute: ANSI INCITS 359-2004 for information technology \u2014 role based access control (2004)"},{"key":"16_CR11","unstructured":"Joosten, R., Beute, B.: Requirements for personal network security architecture specifications \u2014 PNP2008 D2.4. Technical report, Freeband PNP2008 (april 2005)"},{"key":"16_CR12","unstructured":"Joosten, R.: RBAC Specification for Personal Networks \u2014 PNP2008 D2.5. Technical report, Freeband PNP2008 (October 2005)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"H\u00f6hn, S., J\u00fcrjens, J.: Automated checking of SAP security permissions. In: 6th Working Conference on Integrity and Internal Control in Information Systems (IICIS), Lausanne, Switzerland (Nov. 13\u201314 2003)","DOI":"10.1007\/1-4020-7901-X_2"},{"key":"16_CR14","unstructured":"Freeband PNP2008 project: http:\/\/pnp2008.freeband.nl (2005)"}],"container-title":["The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-79026-8_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:06:38Z","timestamp":1619669198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-79026-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9781441946294","9780387790268"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-79026-8_16","relation":{},"subject":[],"published":{"date-parts":[[2008]]}}}